
No additional client is needed in order to gain access to internal resources. Users can achieve secure browser-based access to corporate resources at any time. Clientless SSL Virtual Private Network (WebVPN) allows for limited, but valuable, secure access to the corporate network from any location. This document provides a straightforward configuration for the Cisco Adaptive Security Appliance (ASA) 5500 Series in order to allow Clientless Secure Sockets Layer (SSL) VPN access to internal network resources. A certificate will be used to authenticate the ASA and either/both user+pass and certificate is used to authenticate the user. Anyconnect (using IKEv2 or SSLVPN) doesn't use a pre-shared-key to authenticate the user. Anyconnect based on SSL protocol is called Anyconnect SSL VPN and if you deploy Anyconnect with IPSec protocol,it is called IKev2.

They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms.

Contributed by Amanda Nava, Cisco TAC Engineer. This document describes how to configure Secure Sockets Layer (SSL) Anyconnect with the Cisco Identity Services Engine (ISE) for user mapping to specific Group-Policy.
